SystemBot.exe

System Engine XMAS

The executable SystemBot.exe has been detected as malware by 21 anti-virus scanners. While running, it connects to the Internet address server100.hosting.reg.ru on port 443.
Product:
System Engine XMAS

Description:
SE Launcher

Version:
1.0.0.0

MD5:
dba1bfc76cf3c6e1ce20309c850f2646

SHA-1:
c37fd9c2dc0d2bd0ea381dc38fa536d74ee54646

SHA-256:
c33cbf53bc562d9b1a63d54440843b4ced508992dfef07cf29f28336d7a188ba

Scanner detections:
21 / 68

Status:
Malware

Analysis date:
11/23/2024 11:43:52 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Trojan.Heur2.FU.tz0@aaVGElj
43

AegisLab AV Signature
Gen.Troj.Heur2!c
2.1.4+

AhnLab V3 Security
Trojan/Win32.Symmi.C849874
3.8.2.16

Avira AntiVirus
TR/Black.Gen2
8.3.3.4

Arcabit
Trojan.Heur2.FU.E982E6
1.0.0.792

avast!
Win32:Malware-gen
2014.9-161223

AVG
Win32/Blacked
2017.0.2521

Baidu Antivirus
Win32.Trojan.WisdomEyes.16070401.9500
4.0.3.161223

Bitdefender
Gen:Trojan.Heur2.FU.tz0@aaVGElj
1.0.20.1790

Bkav FE
HW32.Packed
1.3.0.8455

Comodo Security
TrojWare.Win32.Trojan.Obfuscated.~EN
26314

Emsisoft Anti-Malware
Gen:Trojan.Heur2.FU.tz0@aaVGElj
8.16.12.23.05

ESET NOD32
Win32/Packed.VMProtect.ABR (variant)
10.14644

Fortinet FortiGate
PossibleThreat
12/23/2016

F-Secure
Gen:Trojan.Heur2.FU.tz0@aaVGElj
11.2016-23-12_6

G Data
Gen:Trojan.Heur2.FU.tz0@aaVGElj
16.12.25

K7 AntiVirus
Trojan
13.246.21860

McAfee
Artemis!DBA1BFC76CF3
5600.6177

MicroWorld eScan
Gen:Trojan.Heur2.FU.tz0@aaVGElj
17.0.0.1074

Sophos
Mal/VMProtBad-A
4.98

VIPRE Antivirus
Trojan.Win32.Generic
54654

File size:
1.3 MB (1,364,480 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © 2016

Original file name:
SystemBot.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\systembot.exe

File PE Metadata
Compilation timestamp:
7/13/2012 3:47:16 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

Entry address:
0x1533AB

Entry point:
E9, 66, F8, FF, FF, DD, DA, E4, FB, ED, 31, 1F, A2, 73, 92, 5A, 73, 23, 44, EE, E3, D7, DC, C1, 08, C5, FA, BE, BF, 41, 73, 35, 54, 1C, 19, FE, F3, F3, 9B, 2A, B1, F3, 9C, 4F, 8D, AA, 95, C4, F2, BA, B9, 0F, B2, 19, BA, 39, E6, B6, 60, 8A, 6C, 0C, 4E, 15, 8D, BF, 8B, 5A, 47, 68, DB, 81, FE, A7, B2, 49, F7, 64, 0F, CC, F6, AF, A6, CE, B4, 0D, AB, E7, A7, 2C, 09, 43, 74, 19, 53, 88, 60, 85, 79, 31, 8B, 86, 00, 76, 03, 2F, A3, 05, 50, D9, F9, A7, 41, E7, CF, 54, 26, 3A, C6, E6, 3B, 59, 10, E1, 57, EA, 81, FB...
 
[+]

Entropy:
7.8640

Packer / compiler:
tElock 0.99 - 1.0 private

Code size:
102 KB (104,448 bytes)

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP SSL):
Connects to server100.hosting.reg.ru  (37.140.192.188:443)

Remove SystemBot.exe - Powered by Reason Core Security